https://ccnav6.com/ccna-semester-1-v6-0-study-materials-labs-online-course.html
CCNA Semester 1 v6.0 Study Materials and Labs – Online Course CCNA Exam Answers 2017 September 22, 2017
Explore the
1 Network 1.2.4.4 Assignment
Configure a
Network Operating
2 System 2.1.4.6/2.1.4.8, 2.2.3.3/2.2.3.4, 2.3.2.5, 2.4.1.2 Assignment
Network Protocols
and
3 Communications 3.2.4.6, 3.3.3.3 Assignment
Si acum pe larg:
CCNA 1 LABS - PACKET TRACER
In this activity, you will explore a relatively complex network that highlights a few of Packet
Tracer’s features. While doing so, you will learn how to access Help and the tutorials. You will also
learn how to switch between various modes and workspaces. Finally, you will explore how Packet
Tracer serves as a modeling tool for network representations.
Note: It is not important that you understand everything you see and do in this activity. Feel free to
explore the network on your own. If you wish to proceed more systematically, follow the steps
below. Answer the questions to the best of your ability.
Part 1: Overview of the Packet Tracer Program
The network size is larger than most of the networks you will experience in this course (although
you will see this topology often in your Networking Academy studies). You may need to adjust the
window size of Packet Tracer to see the full network. If necessary, you can use the zoom in and
out tools to adjust the size of the Packet Tracer window.
Step 1: Access the Packet Tracer Help pages, tutorial videos, and online resources
a. Access the Packet Tracer Help pages in two ways:
1) Click the question mark icon in the top, right-hand corner of the menu toolbar.
You can choose DHCP or Static and configure the IP address, Subnet Mask, Default Gateway, and
DNS Server.
Step 2: Toggle between Realtime and Simulation modes.
a. Find the Realtime word in the bottom right corner of the Packet Tracer interface. In Realtime
mode, your network is always running like a real network, whether you are working on the network
or not. Your configurations are done in real time, and the network responds in near real time.
b. Click the tab directly behind the Realtime tab to switch to Simulation mode. In Simulation mode,
you can watch your network run at a slower pace, observing the paths that data takes and
inspecting the data packets in detail.
c. In the Simulation Panel, click Auto Capture / Play. You should now see data packets,
represented as envelopes of various colors, traveling between the devices.
d. Click Auto Capture / Play again to pause the simulation.
e. Click Capture / Forward to step through the simulation. Click the button a few more times to see
the effect.
f. In the network topology on the left, click one of the envelopes on an intermediate device and
investigate what is inside. Over the course of your CCNA studies, you will learn the meaning of
most everything inside these envelopes. For now, see if you can answer the following questions:
– Under the OSI Model tab, how many In Layers and Out Layers have information?
Answers will vary depending on the layer of the device.
– Under the Inbound PDU Details and Outbound PDU Details tabs, what are the headings of the
major sections?
Answers will vary, but likely answers will be Ethernet 802.3, LLC, STP BPDU, etc.
– Click back and forth between the Inbound PDU Details and Outbound PDU Details tabs. Do you
see information changing? If so, what?
Answers will vary, but the source and/or destination addresses in the data link layer are changing.
Other data may be changing as well depending on which packet the student chose to open.
g. Click the toggle button above Simulation in the bottom right corner to return to Realtime mode.
Step 3: Toggle between Logical and Physical views.
a. Find the Logical word in the top left corner of the Packet Tracer interface. You are currently in
the Logical workspace where you will spend the majority of your time building, configuring,
investigating, and troubleshooting networks.
Note: Although you can add a geographical map as the background image for the Logical
workspace, it does not usually have any relationship to the actual physical location of devices.
b. Click the tab below Logical to switch to the Physical workspace. The purpose of the Physical
workspace is to give a physical dimension to your Logical network topology. It gives you a sense
of scale and placement (how your network might look in a real environment).
c. During your CCNA studies, you will use this workspace on occasion. For now, just know that it
is here and available for you to use. To learn more about the Physical workspace, refer to the Help
files and tutorial videos.
d. Click the toggle button below Physical in the top right corner to return to the Logical workspace.
c. Without entering into the Internet cloud or Intranet cloud, how many icons in the topology
represent endpoint devices (only one connection leading to them)?
d. Without counting the two clouds, how many icons in the topology represent intermediate
devices (multiple connections leading to them)?
e. How many intermediate devices are routers? Note: The Linksys device is a router.
f. How many end devices are not desktop computers?
g. How many different types of media connections are used in this network topology?
h. Why isn’t there a connection icon for wireless in the Connections category?
d. The Internet in this Packet Tracer network is overly simplified and does not represent the
structure and form of the real Internet. Briefly describe the Internet.
e. What are some of the common ways a home user connects to the Internet?
f. What are some common methods that businesses use to connect to the Internet in your area?
Challenge
Now that you have had an opportunity to explore the network represented in this Packet Tracer
activity, you may have picked up a few skills that you would like to try out. Or maybe you would
like the opportunity to explore this network in more detail. Realizing that most of what you see and
experience in Packet Tracer is currently beyond your skill level, here are some challenges you
might want to attempt. Do not worry if you cannot do them all. You will be a Packet Tracer master
user and network designer soon enough.
– Add an end device to the topology and connect it to one of the LANs with a media connection.
What else does this device need to send data to other end users? Can you provide the
information? Is there a way to verify that you correctly connected the device?
– Add a new intermediary device to one of the networks and connect it to one of the LANs or
WANs with a media connection. What else does this device need to serve as an intermediary to
other devices in the network?
– Open a new instance of Packet Tracer. Create a new network with at least two LANs connected
by a WAN. Connect all the devices. Investigate the original Packet Tracer activity to see what else
you might need to do to make your new network functional. Record your thoughts and save your
Packet Tracer file. You may want to revisit your network later after you have mastered a few more
skills.
Suggested Scoring Rubric
Objectives
Part 1: Basic Connections, Accessing the CLI and Exploring Help
Part 2: Exploring EXEC Modes
Background
In this activity, you will practice skills necessary for navigating the Cisco IOS, including different
user access modes, various configuration modes, and common commands you use on a regular
basis. You also practice accessing the context-sensitive Help by configuring the clock command.
b. Select the light blue Console cable by clicking it. The mouse pointer will change to what
appears to be a connector with a cable dangling off of it.
c. Click PC1; a window displays an option for an RS-232 connection.
d. Drag the other end of the console connection to the S1 switch and click the switch to bring up
the connection list.
Instructions:
1:
2:
3:
Step 2: Establish a terminal session with S1.
a. Click PC1 and then select the Desktop tab.
b. Click the Terminal application icon; verify that the Port Configuration default settings are correct.
d. The screen that appears may have several messages displayed. Somewhere on the display
there should be a Press RETURN to get started! message. Press ENTER.
S1> ?
Which command begins with the letter ‘C’? connect
b. At the prompt, type t, followed by a question mark (?).
S1> t?
Which commands are displayed? telnet terminal traceroute
c. At the prompt, type te, followed by a question mark (?).
S1> te?
Which commands are displayed? telnet terminal
This type of help is known as context-sensitive Help, providing more information as the commands
are expanded.
S1> ?
What information is displayed that describes the enable command? Turn on privileged commands
b. Type en and press the Tab key.
S1> en
What displays after pressing the Tab key? enable
This is called command completion or tab completion. When part of a command is typed, the Tab
key can be used to complete the partial command. If the characters typed are enough to make the
command unique, as in the case with the enable command, the remaining portion is displayed.
There is more than one command that begins with the letters ‘te because ‘te’ does not provide enough
characters to make the command unique. The characters will continue to display prompting the user
for additional characters to make the command unique.
c. Enter the enable command and press ENTER. How does the prompt change? It changes from
S1> to S1#, which indicates privileged EXEC mode.
d. When prompted, type the question mark (?).
S1# ?
Previously there was one command that started with the letter ‘C’ in user EXEC mode. How many
commands are displayed now that privileged EXEC mode is active? (Hint: you could type c? to list
just the commands beginning with ‘C’.)
S1# configure
a. What is the message that is displayed?
S1(config)# exit
S1#
Part 3: Setting the Clock
Step 1: Use the clock command.
a. Use the clock command to further explore Help and command syntax. Type show clock at the
privileged EXEC prompt.
UTC Mon Mar 1 1993 preceded by the hours, minutes, and seconds since the device started. The year
is 1993.
b. Use the context-sensitive Help and the clock command to set the time on the switch to the
current time. Enter the command clock and press ENTER.
S1# clock
What information is displayed? % Incomplete command
c. The % Incomplete command message is returned by the IOS indicating that the clock command
needs further parameters. Any time more information is needed help can be provided by typing a
space after the command and the question mark (?).
S1# clock ?
What information is displayed? set Set the time and date
d. Set the clock using the clock set command. Continue proceeding through the command one
step at a time.
f. Attempt to set the date to 01/31/2035 using the format requested. It may be necessary to
request additional help using the context-sensitive Help to complete the process. When finished,
issue the show clock command to display the clock setting. The resulting command output should
display as:
S1# cl
What information was returned? % Ambiguous command: “cl”
S1# clock
What information was returned? % Incomplete command.
S1# clock set 25:00:00
What information was returned?
Objectives
Part 1: Verify the Default Switch Configuration
Part 2: Configure a Basic Switch Configuration
Part 5: Configure S2
Background
In this activity, you will perform basic switch configurations. You will secure access to the
command-line interface (CLI) and console ports using encrypted and plain text passwords. You
will also learn how to configure messages for users logging into the switch. These banners are
also used to warn unauthorized users that access is prohibited.
The privileged EXEC command set includes those commands contained in user EXEC mode, as
well as the configure command through which access to the remaining command modes are
gained.
a. Click S1 and then the CLI tab. Press Enter
b. Enter privileged EXEC mode by entering the enable command:
Switch> enable
Switch#
Notice that the prompt changed in the configuration to reflect privileged EXEC mode.
show startup-configuration
Why does the switch respond with startup-config is not present?
It displays this message because the configuration file was not saved to NVRAM. Currently it is only
located in RAM.
Part 2: Create a Basic Switch Configuration
Step 1: Assign a name to a switch.
To configure parameters on a switch, you may be required to move between various configuration
modes. Notice how the prompt changes as you navigate through the switch.
S1# exit
Switch con0 is now available
Press RETURN to get started.
User Access Verification
Password:
S1>
Note: If the switch did not prompt you for a password, then you did not configure
the login parameter in Step 2.
Step 4: Secure privileged mode access.
Set the enable password to c1$c0. This password protects access to privileged mode.
Note: The 0 in c1$c0 is a zero, not a capital O. This password will not grade as correct until after
you encrypt it in Step 8.
S1> enable
S1# configure terminal
S1(config)# enable password c1$c0
S1(config)# exit
%SYS-5-CONFIG_I: Configured from console by console
S1#
Step 5: Verify that privileged mode access is secure.
a. Enter the exit command again to log out of the switch.
e. Enter the second password you configured to protect privileged EXEC mode.
S1# config t
S1(config)# enable secret itsasecret
S1(config)# exit
S1#
Note: The enable secret password overrides the enable password. If both are configured on the
switch, you must enter the enable secret password to enter privileged EXEC mode.
Step 7: Verify that the enable secret password is added to the configuration file.
a. Enter the show running-configuration command again to verify the new enable secret password
is configured.
The enable secret is shown in encrypted form, whereas the enable password is in plain text.
Step 8: Encrypt the enable and console passwords.
As you noticed in Step 7, the enable secret password was encrypted, but the enable and console
passwords were still in plain text. We will now encrypt these plain text passwords using the service
password-encryption command.
S1# config t
S1(config)# service password-encryption
S1(config)# exit
If you configure any more passwords on the switch, will they be displayed in the configuration file
as plain text or in encrypted form? Explain why?
The service password-encryption command encrypts all current and future passwords.
Part 3: Configure a MOTD Banner
Step 1: Configure a message of the day (MOTD) banner.
The Cisco IOS command set includes a feature that allows you to configure messages that
anyone logging onto the switch sees. These messages are called message of the day, or MOTD
banners. Enclose the banner text in quotations or use a delimiter different from any character
appearing in the MOTD string.
S1# config t
S1(config)# banner motd “This is a secure system. Authorized Access Only!”
S1(config)# exit
%SYS-5-CONFIG_I: Configured from console by console
S1#
When will this banner be displayed?
The message will be displayed when someone enters the switch through the console port.
Why should every switch have a MOTD banner?
Every switch should have a banner to warn unauthorized users that access is prohibited but can also
be used for sending messages to network personnel/technicians (such as impending system shutdowns
or who to contact for access)
Part 4: Save Configuration Files to NVRAM
Step 1: Verify that the configuration is accurate using the show run command.
Step 2: Save the configuration file.
You have completed the basic configuration of the switch. Now back up the running configuration
file to NVRAM to ensure that the changes made are not lost if the system is rebooted or loses
power.
d. Configure a message to those logging into the switch with the following message:
Authorized access only. Unauthorized access is prohibited and violators will be prosecuted to the full extent
of the law.
e. Encrypt all plain text passwords.
g. Save the configuration file to avoid loss if the switch is powered down.
Switch> enable
Switch# config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# hostname S2
S2(config)# line console 0
S2(config-line)# password letmein
S2(config-line)# login
S2(config-line)# enable password c1$c0
S2(config)# enable secret itsasecret
S2(config)# banner motd $any text here$
S2(config)# service password-encryption
S2(config)# do copy running-config startup-config
Suggested Scoring Rubric
Instructions:
Switch 1 – S1
Switch>enable
Switch#configure terminal
Switch(config)#hostname S1
S1(config)#line console 0
S1(config-line)#password letmein
S1(config-line)#login
S1(config-line)#exit
S1(config)#exit
S1#configure terminal
S1(config)#enable password c1$c0
S1(config)#exit
S1#configure terminal
S1(config)#ena sec itsasecret
S1(config)#exit
S1(config)#service password-encryption
S1(config)#exit
S1#configure terminal
S1(config)#banner motd #This is a secure system. Authorized Access Only!#
S1(config)#exit
S1#copy running-config startup-config
Switch 2 – S2
Switch>enable
Switch#configure terminal
Switch(config)#hostname S2
S2(config)#line console 0
S2(config-line)#password letmein
S2(config-line)#login
S2(config-line)#exit
S2(config)#exit
S2#configure terminal
S2(config)#enable password c1$c0
S2(config)#exit
S2#configure terminal
S2(config)#ena sec itsasecret
S2(config)#exit
S2(config)#service password-encryption
S2(config)#exit
S2#configure terminal
S2(config)#banner motd #Authorized access only. Unauthorized access is prohibited and violators will be
prosecuted to the full extent of the law.#
S2(config)#exit
S2#copy running-config startup-config